Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Citrix Expands Digital Workspace Security Offerings

Company adds Zero Trust solutions to Citrix Ready Workspace Security Program, enabling customers to drive intelligent, contextual approach to securing apps and devices

Work today is happening everywhere on everything from corporate issued laptops and mobile devices to personal tablets and even smartwatches. While this new-found freedom has given a major boost to productivity and innovation, it has also raised a new set of security concerns that require a more intelligent and contextual approach to address. To help drive it, Citrix Systems, Inc. announced that it is expanding the Citrix Ready™ Workspace Security Program to include Zero Trust solutions from trusted and verified partners that will allow companies to simplify the selection of vendors and leverage their existing investments to design a modern security framework that delivers Zero Trust outcomes.

“We’re engaging with like-minded partners who are willing to share data and insights that allow us to deliver more comprehensive and secure solutions to our customers”

“In a world where the security perimeter is no longer defined by a firewall, but the Internet, companies can’t rely on traditional, VPN-based strategies that provide access based on username and passwords,” said Sridhar Mullapudi, Senior Vice President, Product Management, Citrix. “To effectively protect apps and devices, they must shift to a Zero Trust model that uses contextual awareness to adaptively grant access based on user behaviors and access patterns.”

And according to a recent survey conducted by Pulse and Citrix, a majority of IT decision makers plan to do so. Of 100 executives and managers polled in North America, Europe, the Middle East, Africa and the Asia Pacific region, 74 percent said they are looking at adopting a holistic Zero Trust strategy spanning beyond remote access in the next 12 months.

Recommended AI News: Honeywell Introduces Virtual Reality-Based Simulator To Optimize Training For Industrial Workers

Enabling Flexibility and Choice

The Citrix Ready Workspace Security Program provides a choice of leading security vendors that complement Citrix solutions, allowing people to securely work anytime, from anywhere, while simplifying how IT manages the environment, and includes offerings for:

  • Identity and Access Management
  • Monitoring and Analytics
  • Device and Endpoint Security
  • Data Security
  • Network Security

Extending Context and Protection

In expanding the program to include solutions that integrate with these offerings and have zero trust principles built-in, Citrix is providing extended context and an additional layer of security that make an enterprise more secure.

Recommended AI News: i2c Taps Miguel Olvera to Drive Mexican Growth

Partnering for Success

When it comes to Zero Trust, there is no one-size-fits-all solution. With the Citrix Ready Workspace Security Program, companies can effectively evaluate their current security strategies and leverage existing investments to quickly design and implement a Zero Trust framework that delivers results.

“We’re engaging with like-minded partners who are willing to share data and insights that allow us to deliver more comprehensive and secure solutions to our customers,” Mullapudi said. Among the first partners whose solutions have been verified as Citrix Ready:

  • Cisco
  • Google Cloud
  • Microsoft
  • Okta

“This isn’t just about hooking into Citrix Workspace™, but products that actually communicate with each other and share essential, critical information about security that companies can use to enhance their security without getting in the way of the user experience,” Mullapudi said.

Recommended AI News: Powtoon Launches a New Visual Communication Platform

2 Comments
  1. Iron reprocessing services says

    Metal recovery and reprocessing Ferrous metal industry trends Iron disposal

    Ferrous material logistics and handling, Iron waste repurposing facilities, Efficient metal handling

  2. Copper scrap merchants Local copper scrap purchasing Metal scrap management
    Copper cable stripping tool, Scrap metal reclamation and utilization, Certification for copper scrap buyers

Leave A Reply

Your email address will not be published.